WO2015088702A3 - Systèmes et procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces - Google Patents

Systèmes et procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces Download PDF

Info

Publication number
WO2015088702A3
WO2015088702A3 PCT/US2014/065523 US2014065523W WO2015088702A3 WO 2015088702 A3 WO2015088702 A3 WO 2015088702A3 US 2014065523 W US2014065523 W US 2014065523W WO 2015088702 A3 WO2015088702 A3 WO 2015088702A3
Authority
WO
WIPO (PCT)
Prior art keywords
threat
cloud
security
systems
methods
Prior art date
Application number
PCT/US2014/065523
Other languages
English (en)
Other versions
WO2015088702A2 (fr
Inventor
Ganesh Kirti
Rohit Gupta
Kamalendu Biswas
Ramana Rao Satyasai TURLAPATI
Original Assignee
Palerra, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Palerra, Inc. filed Critical Palerra, Inc.
Priority to EP14868736.1A priority Critical patent/EP3080741B1/fr
Publication of WO2015088702A2 publication Critical patent/WO2015088702A2/fr
Publication of WO2015088702A3 publication Critical patent/WO2015088702A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

Selon certains modes de réalisation, l'invention concerne des systèmes et des procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces. Dans un mode de réalisation, un processus de contrôle et d'élimination des menaces pour la sécurité consiste à générer un modèle de menace au moyen d'une première partie de données d'activité, à identifier une menace sur la base du modèle de menace et au moyen d'une seconde partie de données d'activité, à sélectionner une politique de sécurité à mettre en œuvre en réponse à la menace identifiée, à identifier des paramètres de sécurité du cloud dans un système serveur d'applications de cloud hébergées à distance afin de les modifier conformément à la politique de sécurité sélectionnée, à établir une connexion sécurisée avec le système serveur d'applications de cloud hébergées à distance au moyen d'authentifiants de connexion associés à un compte propriétaire à l'aide de l'application de cloud, et à envoyer des instructions au système serveur d'applications de cloud hébergées à distance pour définir les paramètres de sécurité du cloud identifiés en rapport avec le compte propriétaire et conformément à la politique de sécurité sélectionnée.
PCT/US2014/065523 2013-12-13 2014-11-13 Systèmes et procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces WO2015088702A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP14868736.1A EP3080741B1 (fr) 2013-12-13 2014-11-13 Systèmes et procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361916070P 2013-12-13 2013-12-13
US61/916,070 2013-12-13
US14/523,804 2014-10-24
US14/523,804 US9692789B2 (en) 2013-12-13 2014-10-24 Techniques for cloud security monitoring and threat intelligence

Publications (2)

Publication Number Publication Date
WO2015088702A2 WO2015088702A2 (fr) 2015-06-18
WO2015088702A3 true WO2015088702A3 (fr) 2015-11-05

Family

ID=53369924

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/065523 WO2015088702A2 (fr) 2013-12-13 2014-11-13 Systèmes et procédés pour le contrôle de la sécurité d'un cloud et le renseignement sur les menaces

Country Status (3)

Country Link
US (3) US9692789B2 (fr)
EP (1) EP3080741B1 (fr)
WO (1) WO2015088702A2 (fr)

Families Citing this family (193)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9544143B2 (en) 2010-03-03 2017-01-10 Duo Security, Inc. System and method of notifying mobile devices to complete transactions
US9532222B2 (en) 2010-03-03 2016-12-27 Duo Security, Inc. System and method of notifying mobile devices to complete transactions after additional agent verification
US9118689B1 (en) * 2012-04-13 2015-08-25 Zscaler, Inc. Archiving systems and methods for cloud based systems
US9823813B2 (en) 2013-03-15 2017-11-21 Salesforce.Com, Inc. Apparatus and methods for performing an action on a database record
US9529488B2 (en) 2013-03-15 2016-12-27 Salesforce.Com, Inc. Systems and methods for creating custom actions
US9471798B2 (en) 2013-09-20 2016-10-18 Oracle International Corporation Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US9692789B2 (en) 2013-12-13 2017-06-27 Oracle International Corporation Techniques for cloud security monitoring and threat intelligence
US10063654B2 (en) 2013-12-13 2018-08-28 Oracle International Corporation Systems and methods for contextual and cross application threat detection and prediction in cloud applications
US11405410B2 (en) * 2014-02-24 2022-08-02 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US9503467B2 (en) 2014-05-22 2016-11-22 Accenture Global Services Limited Network anomaly detection
US9716721B2 (en) 2014-08-29 2017-07-25 Accenture Global Services Limited Unstructured security threat information analysis
EP3210364B8 (fr) 2014-10-21 2021-03-10 Proofpoint, Inc. Systèmes et procédés pour une analyse de sécurité d'application
US9544307B2 (en) * 2014-10-29 2017-01-10 Salesforce.Com, Inc. Providing a security mechanism on a mobile device
EP4155984B1 (fr) * 2014-10-31 2024-08-28 Proofpoint, Inc. Systèmes et procédés pour effectuer de manière privée une analyse de sécurité d'application
US20160127418A1 (en) * 2014-11-03 2016-05-05 Hewlett Packard Enterprise Development Lp Policy-guided fulfillment of a cloud service
EP3021251A1 (fr) * 2014-11-14 2016-05-18 Hewlett-Packard Development Company, L.P. Ajustement dynamique d'un modèle pour un centre d'opérations de sécurité
US11049207B1 (en) * 2014-12-23 2021-06-29 United Services Automobile Association (Usaa) Early fraud detection system
EP3241142B1 (fr) * 2014-12-30 2020-09-30 British Telecommunications public limited company Détection de logiciel malveillant
US10230742B2 (en) * 2015-01-30 2019-03-12 Anomali Incorporated Space and time efficient threat detection
US20160232349A1 (en) * 2015-02-09 2016-08-11 Fortinet, Inc. Mobile malware detection and user notification
US10412106B2 (en) * 2015-03-02 2019-09-10 Verizon Patent And Licensing Inc. Network threat detection and management system based on user behavior information
US10225268B2 (en) * 2015-04-20 2019-03-05 Capital One Services, Llc Systems and methods for automated retrieval, processing, and distribution of cyber-threat information
US10142371B2 (en) 2015-04-24 2018-11-27 Oracle International Corporation Authorization policy customization and authorization policy lockdown
US10171437B2 (en) 2015-04-24 2019-01-01 Oracle International Corporation Techniques for security artifacts management
US10104086B2 (en) 2015-04-24 2018-10-16 Oracle International Corporation Techniques for fine grained protection of resources in an access management environment
EP3304336B1 (fr) 2015-06-01 2019-10-09 Duo Security, Inc. Procédé de mise en application de normes de santé de point d'extrémité
US10489599B2 (en) 2015-07-02 2019-11-26 Oracle International Corporation Data encryption service and customized encryption management
US10212078B2 (en) * 2015-07-09 2019-02-19 International Business Machines Corporation Enabling network services in multi-tenant IAAS environment
WO2017018926A1 (fr) * 2015-07-24 2017-02-02 Certis Cisco Security Pte Ltd Système et procédé de gestion à grande vitesse de renseignements sur les menaces à l'aide d'algorithmes non supervisés d'apprentissage automatique et de hiérarchisation
US10033604B2 (en) * 2015-08-05 2018-07-24 Suse Llc Providing compliance/monitoring service based on content of a service controller
US9762616B2 (en) * 2015-08-08 2017-09-12 International Business Machines Corporation Application-based security rights in cloud environments
US10425447B2 (en) * 2015-08-28 2019-09-24 International Business Machines Corporation Incident response bus for data security incidents
US9774586B1 (en) * 2015-08-31 2017-09-26 EMC IP Holding Company LLC Dynamic authorization of users in a multi-tenant environment using tenant authorization profiles
US9699205B2 (en) 2015-08-31 2017-07-04 Splunk Inc. Network security system
US9578054B1 (en) 2015-08-31 2017-02-21 Newman H-R Computer Design, LLC Hacking-resistant computer design
US10148679B2 (en) 2015-12-09 2018-12-04 Accenture Global Solutions Limited Connected security system
CN106557531B (zh) * 2015-09-30 2020-07-03 伊姆西Ip控股有限责任公司 复杂结构对象转换成平面化数据的方法、设备和存储介质
CN116860489A (zh) * 2015-11-09 2023-10-10 西普霍特公司 用于安全威胁的威胁风险评分的系统和方法
US11533240B2 (en) 2016-01-15 2022-12-20 Microsoft Technology Licensing, Llc Automatic recommendations for deployments in a data center
KR101905771B1 (ko) * 2016-01-29 2018-10-11 주식회사 엔오디비즈웨어 시스템 환경 및 사용자 행동 분석 기반의 자기 방어 보안 서버와 이의 작동 방법
US11558407B2 (en) * 2016-02-05 2023-01-17 Defensestorm, Inc. Enterprise policy tracking with security incident integration
US11283900B2 (en) 2016-02-08 2022-03-22 Microstrategy Incorporated Enterprise performance and capacity testing
US10440153B1 (en) 2016-02-08 2019-10-08 Microstrategy Incorporated Enterprise health score and data migration
US10200369B1 (en) 2016-02-16 2019-02-05 Symantec Corporation Systems and methods for dynamically validating remote requests within enterprise networks
US10536478B2 (en) 2016-02-26 2020-01-14 Oracle International Corporation Techniques for discovering and managing security of applications
US10542021B1 (en) * 2016-06-20 2020-01-21 Amazon Technologies, Inc. Automated extraction of behavioral profile features
US10516680B1 (en) * 2016-06-22 2019-12-24 NortonLifeLock Inc. Systems and methods for assessing cyber risks using incident-origin information
WO2018000348A1 (fr) * 2016-06-30 2018-01-04 周肇梅 Procédé et système d'implémentation d'une sécurité intelligente sur la base d'un nuage
US10205738B2 (en) 2016-07-12 2019-02-12 Cisco Technology, Inc. Advanced persistent threat mitigation
CN107645483B (zh) * 2016-07-22 2021-03-19 创新先进技术有限公司 风险识别方法、风险识别装置、云风险识别装置及系统
US10242205B2 (en) 2016-08-23 2019-03-26 Red Hat, Inc. Automatic parameter value generation
US10581923B2 (en) 2016-09-07 2020-03-03 Cloud Of Things Ltd System and method for configuration of a connected device connection
US11089064B1 (en) 2016-09-12 2021-08-10 Skyhigh Networks, Llc Cloud security policy enforcement for custom web applications
WO2018080392A1 (fr) * 2016-10-24 2018-05-03 Certis Cisco Security Pte Ltd Réseaux neuronaux analytiques unifiés quantitatifs
US11398906B2 (en) * 2016-11-10 2022-07-26 Brickell Cryptology Llc Confirming receipt of audit records for audited use of a cryptographic key
US10855465B2 (en) 2016-11-10 2020-12-01 Ernest Brickell Audited use of a cryptographic key
US11405201B2 (en) * 2016-11-10 2022-08-02 Brickell Cryptology Llc Secure transfer of protected application storage keys with change of trusted computing base
US10298605B2 (en) * 2016-11-16 2019-05-21 Red Hat, Inc. Multi-tenant cloud security threat detection
US11323427B2 (en) 2016-12-02 2022-05-03 Carrier Corporation Mixed-mode cloud on-premise secure communication
US10171510B2 (en) * 2016-12-14 2019-01-01 CyberSaint, Inc. System and method for monitoring and grading a cybersecurity framework
US10791134B2 (en) * 2016-12-21 2020-09-29 Threat Stack, Inc. System and method for cloud-based operating system event and data access monitoring
US10848501B2 (en) * 2016-12-30 2020-11-24 Microsoft Technology Licensing, Llc Real time pivoting on data to model governance properties
US10701100B2 (en) * 2016-12-30 2020-06-30 Microsoft Technology Licensing, Llc Threat intelligence management in security and compliance environment
US10579821B2 (en) * 2016-12-30 2020-03-03 Microsoft Technology Licensing, Llc Intelligence and analysis driven security and compliance recommendations
US10628590B2 (en) * 2017-01-24 2020-04-21 Salesforce.Com, Inc. Application security assessment
US10445220B2 (en) * 2017-01-25 2019-10-15 Verizon Patent And Licensing Inc. System and methods for application activity capture, error identification, and error correction
US10313441B2 (en) * 2017-02-13 2019-06-04 Bank Of America Corporation Data processing system with machine learning engine to provide enterprise monitoring functions
US10536473B2 (en) * 2017-02-15 2020-01-14 Microsoft Technology Licensing, Llc System and method for detecting anomalies associated with network traffic to cloud applications
US10326787B2 (en) 2017-02-15 2019-06-18 Microsoft Technology Licensing, Llc System and method for detecting anomalies including detection and removal of outliers associated with network traffic to cloud applications
CA3054609A1 (fr) * 2017-02-27 2018-08-30 Ivanti, Inc. Systemes et procedes destines a des configurations de securite informatique basees sur des roles
US20180255099A1 (en) * 2017-03-02 2018-09-06 Microsoft Technology Licensing, Llc Security and compliance alerts based on content, activities, and metadata in cloud
US10262127B2 (en) * 2017-04-05 2019-04-16 General Electric Company Systems and method for securely sharing and executing data and models
US10419564B2 (en) * 2017-04-18 2019-09-17 International Business Machines Corporation Dynamically accessing and configuring secured systems
US10652245B2 (en) 2017-05-04 2020-05-12 Ernest Brickell External accessibility for network devices
US11888883B2 (en) 2017-06-14 2024-01-30 International Business Machines Corporation Threat disposition analysis and modeling using supervised machine learning
US10681061B2 (en) 2017-06-14 2020-06-09 International Business Machines Corporation Feedback-based prioritized cognitive analysis
US10701094B2 (en) 2017-06-22 2020-06-30 Oracle International Corporation Techniques for monitoring privileged users and detecting anomalous activities in a computing environment
US10419460B2 (en) * 2017-07-21 2019-09-17 Oath, Inc. Method and system for detecting abnormal online user activity
US10114943B1 (en) * 2017-08-01 2018-10-30 Cyberark Software Ltd. Automated process of managing and controlling accounts on a remote computer machine
US11487868B2 (en) * 2017-08-01 2022-11-01 Pc Matic, Inc. System, method, and apparatus for computer security
US10764295B2 (en) * 2017-08-08 2020-09-01 International Business Machines Corporation Monitoring service policy management
US11165800B2 (en) 2017-08-28 2021-11-02 Oracle International Corporation Cloud based security monitoring using unsupervised pattern recognition and deep learning
US11847246B1 (en) * 2017-09-14 2023-12-19 United Services Automobile Association (Usaa) Token based communications for machine learning systems
US10944766B2 (en) * 2017-09-22 2021-03-09 Microsoft Technology Licensing, Llc Configurable cyber-attack trackers
US10713365B2 (en) 2017-09-28 2020-07-14 Oracle International Corporation Testing cloud application integrations, data, and protocols
US11120108B2 (en) * 2017-09-30 2021-09-14 Oracle International Corporation Managing security artifacts for multilayered applications
CN109698809B (zh) * 2017-10-20 2021-04-02 中移(苏州)软件技术有限公司 一种账号异常登录的识别方法及装置
US10728256B2 (en) * 2017-10-30 2020-07-28 Bank Of America Corporation Cross channel authentication elevation via logic repository
US10621341B2 (en) 2017-10-30 2020-04-14 Bank Of America Corporation Cross platform user event record aggregation system
US10721246B2 (en) 2017-10-30 2020-07-21 Bank Of America Corporation System for across rail silo system integration and logic repository
US12058160B1 (en) 2017-11-22 2024-08-06 Lacework, Inc. Generating computer code for remediating detected events
US11785104B2 (en) * 2017-11-27 2023-10-10 Lacework, Inc. Learning from similar cloud deployments
US11973784B1 (en) 2017-11-27 2024-04-30 Lacework, Inc. Natural language interface for an anomaly detection framework
US11818156B1 (en) 2017-11-27 2023-11-14 Lacework, Inc. Data lake-enabled security platform
US11770398B1 (en) 2017-11-27 2023-09-26 Lacework, Inc. Guided anomaly detection framework
US11894984B2 (en) * 2017-11-27 2024-02-06 Lacework, Inc. Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments
JP6933112B2 (ja) * 2017-11-30 2021-09-08 富士通株式会社 サイバー攻撃情報処理プログラム、サイバー攻撃情報処理方法および情報処理装置
US11627193B2 (en) * 2017-12-07 2023-04-11 Oracle International Corporation Method and system for tracking application activity data from remote devices and generating a corrective action data structure for the remote devices
US10412113B2 (en) * 2017-12-08 2019-09-10 Duo Security, Inc. Systems and methods for intelligently configuring computer security
CN108121912B (zh) * 2017-12-13 2021-11-09 中国科学院软件研究所 一种基于神经网络的恶意云租户识别方法和装置
US11075946B2 (en) * 2017-12-19 2021-07-27 T-Mobile Usa, Inc. Honeypot adaptive security system
US11010233B1 (en) 2018-01-18 2021-05-18 Pure Storage, Inc Hardware-based system monitoring
US10970395B1 (en) 2018-01-18 2021-04-06 Pure Storage, Inc Security threat monitoring for a storage system
CN108388631B (zh) * 2018-02-13 2021-05-25 北京奇安信科技有限公司 一种威胁情报共享的方法、代理装置及系统
EP4312420A3 (fr) 2018-02-20 2024-04-03 Darktrace Holdings Limited Procédé de partage d'analyse des menaces de cybersécurité et de mesures défensives parmi une communauté
EP3540618B1 (fr) * 2018-03-15 2023-01-25 Rohde & Schwarz GmbH & Co. KG Appareil de stockage portable
EP3714367A4 (fr) * 2018-03-22 2021-01-20 Snowflake Inc. Développement incrémental de fonction et capture de charge de travail dans des systèmes de base de données
EP3791279A4 (fr) 2018-05-11 2022-01-26 Cigent Technology, Inc. Procédé et système pour un contrôle de données et un accès aux données améliorés
WO2019220182A1 (fr) * 2018-05-17 2019-11-21 Pratik Sharma Fonctions de sécurité spécifiques à une application dans un réseau
US11425160B2 (en) * 2018-06-20 2022-08-23 OneTrust, LLC Automated risk assessment module with real-time compliance monitoring
US11271801B2 (en) * 2018-06-27 2022-03-08 T-Mobile Usa, Inc. Compromised network node detection system
US10965700B2 (en) * 2018-07-02 2021-03-30 Paypal, Inc. Fraud detection based on analysis of frequency-domain data
US11354338B2 (en) 2018-07-31 2022-06-07 International Business Machines Corporation Cognitive classification of workload behaviors in multi-tenant cloud computing environments
US10826756B2 (en) * 2018-08-06 2020-11-03 Microsoft Technology Licensing, Llc Automatic generation of threat remediation steps by crowd sourcing security solutions
US10911479B2 (en) 2018-08-06 2021-02-02 Microsoft Technology Licensing, Llc Real-time mitigations for unfamiliar threat scenarios
EP3837867B1 (fr) * 2018-09-27 2023-11-01 Palo Alto Networks, Inc. Sécurité basée sur une tranche de réseau dans des réseaux mobiles
US10944796B2 (en) 2018-09-27 2021-03-09 Palo Alto Networks, Inc. Network slice-based security in mobile networks
US11477238B1 (en) * 2018-10-16 2022-10-18 Styra, Inc. Viewing aggregate policies for authorizing an API
US11658962B2 (en) 2018-12-07 2023-05-23 Cisco Technology, Inc. Systems and methods of push-based verification of a transaction
US11522898B1 (en) * 2018-12-17 2022-12-06 Wells Fargo Bank, N.A. Autonomous configuration modeling and management
US10951496B2 (en) * 2018-12-24 2021-03-16 Threat Stack, Inc. System and method for cloud-based control-plane event monitor
US11233804B2 (en) 2019-01-28 2022-01-25 Microsoft Technology Licensing, Llc Methods and systems for scalable privacy-preserving compromise detection in the cloud
US11050837B2 (en) * 2019-01-31 2021-06-29 Hewlett Packard Enterprise Development Lp Providing cloud services associated with unused hardware resources of private cloud providers
US10680913B1 (en) 2019-02-11 2020-06-09 Hewlett Packard Enterprise Development Lp Error remediation in software as a service (SaaS) portals
WO2020167928A1 (fr) * 2019-02-13 2020-08-20 Obsidian Security, Inc. Systèmes et procédés de détection d'incidents de sécurité dans des services d'application en nuage
US10880175B2 (en) * 2019-03-07 2020-12-29 Lookout, Inc. Developing security policies for deployment to mobile devices
AU2019439058A1 (en) * 2019-04-03 2021-09-02 Citrix Systems, Inc. Systems and methods for protecting remotely hosted application from malicious attacks
EP3980891A4 (fr) 2019-06-10 2023-06-28 Conquest Technology Services Corp Application logicielle pour évaluer, traiter et remédier en continu à un cyber-risque en temps réel
US11308211B2 (en) 2019-06-18 2022-04-19 International Business Machines Corporation Security incident disposition predictions based on cognitive evaluation of security knowledge graphs
US11297075B2 (en) * 2019-07-03 2022-04-05 Microsoft Technology Licensing, Llc Determine suspicious user events using grouped activities
US10581851B1 (en) 2019-07-17 2020-03-03 Capital One Services, Llc Change monitoring and detection for a cloud computing environment
US11645659B2 (en) 2019-07-31 2023-05-09 Nutanix, Inc. Facilitating customers to define policies for their clouds
US11637748B2 (en) 2019-08-28 2023-04-25 Microstrategy Incorporated Self-optimization of computing environments
US11210189B2 (en) 2019-08-30 2021-12-28 Microstrategy Incorporated Monitoring performance of computing systems
US11611571B2 (en) * 2019-09-03 2023-03-21 Code42 Software, Inc. Detecting suspicious file activity
US11475374B2 (en) * 2019-09-14 2022-10-18 Oracle International Corporation Techniques for automated self-adjusting corporation-wide feature discovery and integration
US11354216B2 (en) 2019-09-18 2022-06-07 Microstrategy Incorporated Monitoring performance deviations
US11360881B2 (en) 2019-09-23 2022-06-14 Microstrategy Incorporated Customizing computer performance tests
US11438231B2 (en) * 2019-09-25 2022-09-06 Microstrategy Incorporated Centralized platform management for computing environments
US11615185B2 (en) 2019-11-22 2023-03-28 Pure Storage, Inc. Multi-layer security threat detection for a storage system
US12079502B2 (en) 2019-11-22 2024-09-03 Pure Storage, Inc. Storage element attribute-based determination of a data protection policy for use within a storage system
US11720692B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Hardware token based management of recovery datasets for a storage system
US12067118B2 (en) 2019-11-22 2024-08-20 Pure Storage, Inc. Detection of writing to a non-header portion of a file as an indicator of a possible ransomware attack against a storage system
US11720714B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Inter-I/O relationship based detection of a security threat to a storage system
US11651075B2 (en) 2019-11-22 2023-05-16 Pure Storage, Inc. Extensible attack monitoring by a storage system
US11520907B1 (en) 2019-11-22 2022-12-06 Pure Storage, Inc. Storage system snapshot retention based on encrypted data
US11675898B2 (en) 2019-11-22 2023-06-13 Pure Storage, Inc. Recovery dataset management for security threat monitoring
US11687418B2 (en) 2019-11-22 2023-06-27 Pure Storage, Inc. Automatic generation of recovery plans specific to individual storage elements
US11657155B2 (en) 2019-11-22 2023-05-23 Pure Storage, Inc Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
US12050689B2 (en) 2019-11-22 2024-07-30 Pure Storage, Inc. Host anomaly-based generation of snapshots
US11341236B2 (en) 2019-11-22 2022-05-24 Pure Storage, Inc. Traffic-based detection of a security threat to a storage system
US12050683B2 (en) * 2019-11-22 2024-07-30 Pure Storage, Inc. Selective control of a data synchronization setting of a storage system based on a possible ransomware attack against the storage system
US11500788B2 (en) 2019-11-22 2022-11-15 Pure Storage, Inc. Logical address based authorization of operations with respect to a storage system
US11941116B2 (en) 2019-11-22 2024-03-26 Pure Storage, Inc. Ransomware-based data protection parameter modification
US11625481B2 (en) 2019-11-22 2023-04-11 Pure Storage, Inc. Selective throttling of operations potentially related to a security threat to a storage system
US11755751B2 (en) 2019-11-22 2023-09-12 Pure Storage, Inc. Modify access restrictions in response to a possible attack against data stored by a storage system
US11645162B2 (en) 2019-11-22 2023-05-09 Pure Storage, Inc. Recovery point determination for data restoration in a storage system
US12079356B2 (en) 2019-11-22 2024-09-03 Pure Storage, Inc. Measurement interval anomaly detection-based generation of snapshots
US12079333B2 (en) 2019-11-22 2024-09-03 Pure Storage, Inc. Independent security threat detection and remediation by storage systems in a synchronous replication arrangement
KR102287981B1 (ko) * 2019-12-02 2021-08-10 순천향대학교 산학협력단 클라우드 컴퓨팅을 위한 안전한 역할 기반 액세스 제어 시스템 및 방법
US11356472B1 (en) * 2019-12-16 2022-06-07 Wells Fargo Bank, N.A. Systems and methods for using machine learning for geographic analysis of access attempts
US11461786B2 (en) * 2020-03-02 2022-10-04 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing cross cloud engagement activity visualization without requiring database merge or data replication
US11438364B2 (en) * 2020-04-30 2022-09-06 Bank Of America Corporation Threat analysis for information security
JP2023532297A (ja) * 2020-06-29 2023-07-27 イルミナ インコーポレイテッド セキュアな発見フレームワークを介した一時的なクラウドプロバイダクレデンシャル
CA3177385A1 (fr) 2020-06-29 2022-01-06 Prabhu PALANISAMY Partage de donnees genomiques a base de politiques de locataires de logiciel en tant que service
US11652832B2 (en) * 2020-07-01 2023-05-16 Vmware, Inc. Automated identification of anomalous devices
US11526825B2 (en) * 2020-07-27 2022-12-13 Cygnvs Inc. Cloud-based multi-tenancy computing systems and methods for providing response control and analytics
US11489721B2 (en) * 2020-09-22 2022-11-01 Vmware, Inc. Dynamic compliance management
US11836268B2 (en) * 2020-10-02 2023-12-05 Servicenow, Inc. Machine learning platform with model storage
CN112073252A (zh) * 2020-11-12 2020-12-11 北京优炫软件股份有限公司 一种云平台监控方法及系统、电子设备和存储介质
CN112560027A (zh) * 2020-12-18 2021-03-26 福建中信网安信息科技有限公司 一种数据安全监测系统
CN112783005B (zh) * 2021-01-07 2022-05-17 北京航空航天大学 一种基于仿真的系统理论过程分析方法
US11934531B2 (en) 2021-02-25 2024-03-19 Bank Of America Corporation System and method for automatically identifying software vulnerabilities using named entity recognition
US20220337633A1 (en) * 2021-04-15 2022-10-20 Anamika Bhattacharya Heuristic model to self-manage and auto-update containerized services
US12058163B2 (en) 2021-08-10 2024-08-06 CyberSaint, Inc. Systems, media, and methods for utilizing a crosswalk algorithm to identify controls across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments
CN113726812B (zh) * 2021-09-08 2023-06-30 北京鼎普科技股份有限公司 一种终端运行日志审计方法及系统
US12041062B2 (en) 2021-09-15 2024-07-16 Cygnvs Inc. Systems for securely tracking incident data and automatically generating data incident reports using collaboration rooms with dynamic tenancy
US11477208B1 (en) 2021-09-15 2022-10-18 Cygnvs Inc. Systems and methods for providing collaboration rooms with dynamic tenancy and role-based security
US11354430B1 (en) 2021-09-16 2022-06-07 Cygnvs Inc. Systems and methods for dynamically establishing and managing tenancy using templates
US20230095756A1 (en) * 2021-09-29 2023-03-30 Salesforce.Com, Inc. Dynamically reconfiguring a database system of a tenant based on risk profile(s) of the tenant
US11936785B1 (en) 2021-12-27 2024-03-19 Wiz, Inc. System and method for encrypted disk inspection utilizing disk cloning techniques
US12081656B1 (en) 2021-12-27 2024-09-03 Wiz, Inc. Techniques for circumventing provider-imposed limitations in snapshot inspection of disks for cybersecurity
US20230247040A1 (en) * 2022-01-31 2023-08-03 Wiz, Inc. Techniques for cloud detection and response from cloud logs utilizing a security graph
US20230275932A1 (en) * 2022-02-25 2023-08-31 Vmware, Inc. Validation of security standard implementation for applications in protected execution environment
US12105808B2 (en) * 2022-03-31 2024-10-01 Drata Inc. Automated trust center for real-time security and compliance monitoring
US12079328B1 (en) 2022-05-23 2024-09-03 Wiz, Inc. Techniques for inspecting running virtualizations for cybersecurity risks
US12061719B2 (en) 2022-09-28 2024-08-13 Wiz, Inc. System and method for agentless detection of sensitive data in computing environments
US12061925B1 (en) 2022-05-26 2024-08-13 Wiz, Inc. Techniques for inspecting managed workloads deployed in a cloud computing environment
CN115296840B (zh) * 2022-06-24 2024-02-27 上海淇玥信息技术有限公司 基于关联节点安全状态的安全预警方法、装置及电子设备
US20240039936A1 (en) * 2022-08-01 2024-02-01 Wiz, Inc. System and method for generating normalized event logs for cloud detection and response in a multi-layered cloud environment
US20240039929A1 (en) * 2022-08-01 2024-02-01 Wiz, Inc. System and method for threat detection across multiple cloud environments utilizing normalized event logs
GB2622071A (en) * 2022-09-01 2024-03-06 Sophos Ltd Cybersecurity configuration in a cloud environment
CN117459327B (zh) * 2023-12-22 2024-03-26 杭州海康威视数字技术股份有限公司 一种云数据透明加密保护方法、系统及装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030048174A1 (en) * 2001-09-11 2003-03-13 Alcatel, Societe Anonyme Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
US7603452B1 (en) * 2002-03-26 2009-10-13 Symantec Corporation Networked computer environment assurance system and method
US20110185055A1 (en) * 2010-01-26 2011-07-28 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US20120030767A1 (en) * 2010-07-29 2012-02-02 Accenture Global Services Limited. System and method for performing threat assessments using situational awareness
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
US20130066945A1 (en) * 2011-09-14 2013-03-14 Microsoft Corporation Multi Tenant Access To Applications
US20130191921A1 (en) * 2008-10-21 2013-07-25 Lookout, Inc. Security status and information display system

Family Cites Families (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997032889A1 (fr) 1996-03-08 1997-09-12 The Regents Of The University Of Michigan MURINE α(1,3)FUCOSYLTRANSFERASE Fuc-TVII, ADN LA CODANT, PROCEDE DE PREPARATION, ANTICORPS LA RECONNAISSANT, DOSAGE IMMUNOLOGIQUES PERMETTANT DE LA DETECTER ET PLASMIDES
US10129273B2 (en) 2001-11-30 2018-11-13 Cisco Technology, Inc. System and methods for computer network security involving user confirmation of network connections
JP2003271458A (ja) 2002-03-12 2003-09-26 Tdk Corp コンテンツ配信システムおよび、これに用いるコンピュータプログラム、記録媒体、端末装置、およびサーバ
US9130921B2 (en) * 2003-09-30 2015-09-08 Ca, Inc. System and method for bridging identities in a service oriented architectureprofiling
US9130897B2 (en) * 2003-09-30 2015-09-08 Ca, Inc. System and method for securing web services
US20050188222A1 (en) 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user login activity for a server application
TW200618565A (en) 2004-07-29 2006-06-01 Intelli7 Inc System and method of characterizing and managing electronic traffic
US7647622B1 (en) * 2005-04-22 2010-01-12 Symantec Corporation Dynamic security policy through use of empirical security events
US9860274B2 (en) * 2006-09-13 2018-01-02 Sophos Limited Policy management
US8707431B2 (en) 2007-04-24 2014-04-22 The Mitre Corporation Insider threat detection
US9069599B2 (en) * 2008-06-19 2015-06-30 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US9141628B1 (en) 2008-11-07 2015-09-22 Cloudlock, Inc. Relationship model for modeling relationships between equivalent objects accessible over a network
US8812012B2 (en) 2008-12-16 2014-08-19 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20100180001A1 (en) 2009-01-11 2010-07-15 Dick Clarence Hardt Contextual messaging and notification system
WO2010091186A2 (fr) * 2009-02-04 2010-08-12 Breach Security, Inc. Procédé et système pour fournir une protection à distance à des serveurs web
AU2010234958A1 (en) * 2009-03-31 2011-10-13 Coach Wei System and method for access management and security protection for network accessible computer services
US8731984B2 (en) 2009-04-17 2014-05-20 Visa International Service Association Global concierge
US8914878B2 (en) 2009-04-29 2014-12-16 Juniper Networks, Inc. Detecting malicious network software agents
JP5345492B2 (ja) 2009-09-29 2013-11-20 日本電信電話株式会社 Dnsトラフィックデータを利用したボット感染者検知方法
CN102082780B (zh) * 2009-11-30 2014-03-05 国际商业机器公司 安全验证的方法和装置
US8495746B2 (en) 2009-12-18 2013-07-23 Verizon Patent And Licensing Inc. Apparatuses, methods and systems of an application security management platform
US8745397B2 (en) 2010-01-04 2014-06-03 Microsoft Corporation Monitoring federation for cloud based services and applications
US9129086B2 (en) 2010-03-04 2015-09-08 International Business Machines Corporation Providing security services within a cloud computing environment
EP2577552A4 (fr) 2010-06-02 2014-03-12 Hewlett Packard Development Co Schémas multidimensionnels dynamiques utilisés pour la surveillance d'événements
JP6019484B2 (ja) 2010-08-25 2016-11-02 ルックアウト、アイエヌシー. サーバで結合されたマルウェア防止のためのシステムと方法
US9119017B2 (en) * 2011-03-18 2015-08-25 Zscaler, Inc. Cloud based mobile device security and policy enforcement
US9286471B2 (en) * 2011-10-11 2016-03-15 Citrix Systems, Inc. Rules based detection and correction of problems on mobile devices of enterprise users
US9058486B2 (en) * 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
CN103067344B (zh) * 2011-10-24 2016-03-30 国际商业机器公司 在云环境中自动分发安全规则的非侵入性方法和设备
WO2013063474A1 (fr) * 2011-10-28 2013-05-02 Scargo, Inc. Système de déploiement et d'application de politiques de sécurité pour la détection et la maîtrise de logiciels malveillants polymorphiques et ciblés
US20130254880A1 (en) 2012-03-21 2013-09-26 Mcafee, Inc. System and method for crowdsourcing of mobile application reputations
US9027076B2 (en) 2012-03-23 2015-05-05 Lockheed Martin Corporation Method and apparatus for context aware mobile security
US9049207B2 (en) * 2012-04-11 2015-06-02 Mcafee, Inc. Asset detection system
US8776180B2 (en) * 2012-05-01 2014-07-08 Taasera, Inc. Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US9430640B2 (en) 2012-09-28 2016-08-30 Intel Corporation Cloud-assisted method and service for application security verification
SG11201507023XA (en) 2013-03-04 2015-10-29 Docusign Inc Systems and methods for cloud data security
US9117080B2 (en) 2013-07-05 2015-08-25 Bitdefender IPR Management Ltd. Process evaluation for malware detection in virtual machines
EP3734474A3 (fr) * 2013-11-11 2021-01-20 Microsoft Technology Licensing, LLC Courtier de sécurité et proxy de services cloud
US10063654B2 (en) 2013-12-13 2018-08-28 Oracle International Corporation Systems and methods for contextual and cross application threat detection and prediction in cloud applications
US9692789B2 (en) 2013-12-13 2017-06-27 Oracle International Corporation Techniques for cloud security monitoring and threat intelligence
WO2015103338A1 (fr) * 2013-12-31 2015-07-09 Lookout, Inc. Sécurité de réseau basée sur des nuages
JP6174520B2 (ja) 2014-05-22 2017-08-02 日本電信電話株式会社 悪性通信パターン検知装置、悪性通信パターン検知方法、および、悪性通信パターン検知プログラム
US20150341357A1 (en) 2014-05-23 2015-11-26 Intuit Inc. Method and system for access control management using reputation scores
US9330263B2 (en) 2014-05-27 2016-05-03 Intuit Inc. Method and apparatus for automating the building of threat models for the public cloud
US9563488B2 (en) 2014-05-29 2017-02-07 Apple Inc. Sharing extension points to allow an application to share content via a sharing extension
WO2015196281A1 (fr) 2014-06-24 2015-12-30 Sportlogiq Inc. Système et procédé de description d'évènement visuel et d'analyse d'évènement
US10198579B2 (en) 2014-08-22 2019-02-05 Mcafee, Llc System and method to detect domain generation algorithm malware and systems infected by such malware
US9699205B2 (en) 2015-08-31 2017-07-04 Splunk Inc. Network security system
US10200369B1 (en) 2016-02-16 2019-02-05 Symantec Corporation Systems and methods for dynamically validating remote requests within enterprise networks
US9912686B2 (en) 2016-02-18 2018-03-06 Tracker Networks Inc. Methods and systems for enhancing data security in a computer network
US10536478B2 (en) 2016-02-26 2020-01-14 Oracle International Corporation Techniques for discovering and managing security of applications
US10523692B2 (en) 2016-04-08 2019-12-31 Samsung Electronics Co., Ltd. Load balancing method and apparatus in intrusion detection system
US10757053B2 (en) 2017-03-02 2020-08-25 Microsoft Technology Licensing, Llc High confidence digital content treatment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030048174A1 (en) * 2001-09-11 2003-03-13 Alcatel, Societe Anonyme Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
US7603452B1 (en) * 2002-03-26 2009-10-13 Symantec Corporation Networked computer environment assurance system and method
US20130191921A1 (en) * 2008-10-21 2013-07-25 Lookout, Inc. Security status and information display system
US20110185055A1 (en) * 2010-01-26 2011-07-28 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US20120030767A1 (en) * 2010-07-29 2012-02-02 Accenture Global Services Limited. System and method for performing threat assessments using situational awareness
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
US20130066945A1 (en) * 2011-09-14 2013-03-14 Microsoft Corporation Multi Tenant Access To Applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GUPTA ET AL.: "Identification of Effective Public Cloud on User Query", 7 July 2013 (2013-07-07), XP055234968, Retrieved from the Internet <URL:http://ijcttjournal.org/Volume4/issue-7/IJCTT-V4I7P103.pdf> [retrieved on 20150122] *

Also Published As

Publication number Publication date
US20150172321A1 (en) 2015-06-18
EP3080741B1 (fr) 2018-03-07
US10958679B2 (en) 2021-03-23
US20170295199A1 (en) 2017-10-12
WO2015088702A2 (fr) 2015-06-18
US20210168167A1 (en) 2021-06-03
US9692789B2 (en) 2017-06-27
EP3080741A2 (fr) 2016-10-19
US11962614B2 (en) 2024-04-16
EP3080741A4 (fr) 2017-06-14

Similar Documents

Publication Publication Date Title
WO2015088702A3 (fr) Systèmes et procédés pour le contrôle de la sécurité d&#39;un cloud et le renseignement sur les menaces
PL3580679T3 (pl) Zaufany sposób logowania, serwer i system
WO2015073422A3 (fr) Système et procédé permettant de mettre à jour une clé de chiffrement dans un réseau
EP3720055A4 (fr) Dispositif de commande électronique, serveur de détection d&#39;utilisation non autorisée, système de réseau embarqué, système de surveillance de réseau monté sur véhicule, et procédé de surveillance de réseau monté sur véhicule
SG11202001248QA (en) System and method for aggregating client data and cyber data for authentication determinations
WO2018201147A3 (fr) Procédés, appareil et systèmes pour commander des dispositifs connectés à internet ayant des systèmes intégrés ayant des fonctions spécialisées
EP3118771A4 (fr) Procédé et dispositif de gestion de données confidentielles et procédé et système d&#39;authentification de sécurité
WO2016190903A3 (fr) Procédé et appareil pour sécuriser une application mobile
EP3350974A4 (fr) Passerelle de chiffrement d&#39;objets de données ou de fichier sécurisés à partir d&#39;un ou de plusieurs clients vers un serveur en nuage ou éloigné
EP3393089A4 (fr) Dispositif de sécurité, système de réseau et procédé de détection d&#39;attaque
EP3123661A4 (fr) Systèmes et procédés d&#39;application de politique d&#39;authentification multi-facteur au moyen d&#39;un ou plusieurs gestionnaires de politique
EP4221076A3 (fr) Défense adaptative dynamique pour menaces de cybersécurité
WO2016081516A3 (fr) Procédé et système de détection de menaces au moyen d&#39;un mappage de grappes passives
WO2017106208A3 (fr) Gestion de dispositifs au moyen d&#39;une tunnellisation
EP4271017A3 (fr) Réseau domestique sécurisé
WO2014047385A3 (fr) Mécanismes de notification d&#39;abonnement pour la synchronisation d&#39;états distribués
EP3300331A4 (fr) Procédé, appareil et système de réponse dans une authentification informatique de réseau virtuel, et serveur mandataire
MX2016012082A (es) Metodos y sistemas para recomendar configuraciones de comunicacion.
EP3413578A4 (fr) Serveur, système de contrôle à distance et procédé de contrôle à distance
EP3544224A4 (fr) Système de communication, véhicule, dispositif serveur, procédé de communication, et programme d&#39;ordinateur
EP3334085A4 (fr) Dispositif de gestion, système de gestion, dispositif de génération de clé, système de génération de clé, système de gestion de clé, véhicule, procédé de gestion, procédé de génération de clé et programme informatique
WO2016114830A3 (fr) Procédés et systèmes d&#39;interopérabilité d&#39;authentification
WO2015029037A3 (fr) Procédé et système de gestion de maliciel
EP3499793A4 (fr) Système de fourniture de données, dispositif pour la sécurité des données, procédé de fourniture de données, et programme informatique
HK1206172A1 (en) An application security verification method, an application server, an application client and a system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14868736

Country of ref document: EP

Kind code of ref document: A2

REEP Request for entry into the european phase

Ref document number: 2014868736

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014868736

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE